2017
DOI: 10.9734/bjmcs/2017/32744
|View full text |Cite
|
Sign up to set email alerts
|

Formal Analysis of MCAP Protocol Against Replay Attack

Abstract: Replay attack is considered a common attacking technique that is used by adversaries to gain access to confidential information. Several approaches have been proposed to prevent replay attack in security-critical systems such as Automated Teller Machines (ATM) systems. Among those approaches is a recent one called the Mutual Chain Authentication Protocol for the Saudi Payments Network transactions (MCAP). This protocol aims to allow Saudi banking systems to overcome existing weaknesses in the currently used Tw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6

Relationship

4
2

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 8 publications
(23 reference statements)
0
9
0
Order By: Relevance
“…In this section, we apply the BAN logic model [16,35] to examine the freshness and originality of the authentication messages exchanged between the NFC mobile, NFC POS and AuC in the authentication phase. To apply the BAN logic model, the basic notation and believing rules that we will used are listed in the Tabs.…”
Section: Security Verification Using Ban Logicmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we apply the BAN logic model [16,35] to examine the freshness and originality of the authentication messages exchanged between the NFC mobile, NFC POS and AuC in the authentication phase. To apply the BAN logic model, the basic notation and believing rules that we will used are listed in the Tabs.…”
Section: Security Verification Using Ban Logicmentioning
confidence: 99%
“…In the mobile payment system, the process of payment can be summarized into the following steps [14][15][16][17][18]: the user places his/her NFC mobile within the range of the intended NFC POS in order to transmit the payment transaction request message; the NFC POS retransmits the transaction to the authentication center (AuC) of the payment serving provider (PSP); the AuC validates the POS NFC and NFC mobile; the AuC sends the transaction payment response message to the NFC POS; the NFC mobile is validated by the NFC POS; and the NFC mobile receives the transaction payment response message from the NFC POS. Upon receiving the response message, the NFC POS is then validated by the NFC mobile in order to complete the transaction.…”
Section: Introductionmentioning
confidence: 99%
“…The BAN logic model will be used to ensure that the authentication messages exchanged during the authentication and key agreement stage between the healthcare professional node (Ui), medical sensor node (SNj), and GWN are reliable, original, and up-to-date [9,22,24]. The notation, rules of the model, lists of our authentication goals, idealization of the exchange messages, and assumptions that are used in the verification process are illustrated in Tabs.…”
Section: Validation Using Ban Logic Modelmentioning
confidence: 99%
“…Then, we declared four free names, secret1, secret2, secret3, and secret4, to verify the secrecy of the session key (SJj) that will be established (line 16). Next, we defined eight authentication events that determine the start and end of the authentication processes to check the effectivity of mutual authentication between participants (lines [17][18][19][20][21][22][23][24]. Finally, we declared eight queries to verify whether our authentication scheme could satisfy the session key secrecy and mutual authentication (lines 25-32).…”
Section: Table 6: Initial Assumptionsmentioning
confidence: 99%
“…Table 1 presents the key hierarchy of the Extended Authentication and Key Agreement protocol (EPS-AKA) deployed in the LTE networks. The authors in [15] elaborate that the root key (K) is utilized by the UE and the HSS to derive both Cipher key (CK) key and Integrity key (IK) key. Upon completion of mutual authentication between the UE and the HSS, the UE and the HSS derive the local root key, K ASME , by binding both CK and IK with MME identity to the key derivation function (KDF).…”
Section: Related Workmentioning
confidence: 99%